top of page


Enterprise Security Tech
A cybersecurity resource for CxOs
Search


2026: The Year Cybersecurity Becomes Autonomous
This guest article was contributed by Scott Richards, SVP of AI & Discovery and Cybersecurity at OpenText Enterprises are under growing security pressure in 2026. Data volume continues to multiply. Identity sprawl is expanding across hybrid and cloud environments. Threat actors increasingly use AI to find new attack vectors. And at the same time, AI powered security tools have matured and can now provide context aware, automated protection rather than alarm overload. This cre
Jan 13


University of Hawaii Cancer Center Quietly Managed a Ransomware Breach for Months Before Telling the Public
The University of Hawaii Cancer Center is facing growing scrutiny after quietly navigating a ransomware attack that compromised decades old cancer research data, then waiting months to inform regulators and affected individuals. According to a report filed with the Hawaii state legislature in December, attackers gained unauthorized access to servers supporting cancer research operations in late August. The intruders encrypted systems, disrupted access to research files, and
Jan 13


AI Is Supercharging Cybercrime Faster Than Defenses Can Keep Up
Artificial intelligence is no longer just changing how organizations defend themselves online. It is fundamentally reshaping how cybercrime works, compressing the time, cost, and skill required to launch attacks that once demanded large criminal operations or nation-state backing. That is one of the clearest signals emerging from the World Economic Forum’s Global Cybersecurity Outlook 2026 , which finds that cyber-enabled fraud and phishing have overtaken ransomware as the to
Jan 13


Cybersecurity in 2025: When Defenders Protected Systems—and Attackers Exploited People
As the cybersecurity industry closes the books on 2025, the year is already solidifying around a familiar but unsettling conclusion: attackers didn’t need radically new malware to cause outsized damage. They needed people, timing, and a growing catalog of quietly catastrophic infrastructure flaws. That’s the throughline emerging from a year-end review by incident response specialists at LevelBlue , which absorbed digital forensics heavyweight Stroz Friedberg earlier this year
Jan 12


A Zero-Day in the Control Plane Forces Enterprises to Rethink Trust in Security Software
A flaw buried deep inside enterprise security tooling is once again forcing defenders to confront an uncomfortable truth: the systems designed to protect the network can also become its most dangerous point of failure. This week, Trend Micro issued emergency updates for its on-premises Apex Central management console after researchers disclosed three serious vulnerabilities — including a critical zero-day that allows unauthenticated attackers to execute code remotely with fu
Jan 9


MongoDB Flaw Dubbed 'MongoBleed' Lets Attackers Siphon Sensitive Data Straight From Server Memory
A newly disclosed flaw in MongoDB dubbed 'MongoBleed' is exposing a subtle but dangerous reality of modern cloud infrastructure: sometimes the most sensitive data does not need to be stolen from a database table at all. It can simply leak out of memory. Tracked as CVE-2025-14847 , the vulnerability affects how MongoDB processes zlib-compressed network traffic. Under specific conditions, a remote attacker can trigger the database server to return fragments of its own uniniti
Dec 29, 2025
bottom of page